Search the dblp DataBase
Frédéric Valette :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Rémy Daudigny , Hervé Ledig , Frédéric Muller , Frédéric Valette SCARE of the DES. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:393-406 [Conf ] Sébastien Kunz-Jacques , Frédéric Muller , Frédéric Valette The Davies-Murphy Power Attack. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:451-467 [Conf ] Pierre-Alain Fouque , Frédéric Muller , Guillaume Poupard , Frédéric Valette Defeating Countermeasures Based on Randomized BSD Representations. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:312-327 [Conf ] Pierre-Alain Fouque , Frédéric Valette The Doubling Attack - Why Upwards Is Better than Downwards . [Citation Graph (0, 0)][DBLP ] CHES, 2003, pp:269-280 [Conf ] Hervé Ledig , Frédéric Muller , Frédéric Valette Enhancing Collision Attacks. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:176-190 [Conf ] Pierre-Alain Fouque , Sébastien Kunz-Jacques , Gwenaëlle Martinet , Frédéric Muller , Frédéric Valette Power Attack on Small RSA Public Exponent. [Citation Graph (0, 0)][DBLP ] CHES, 2006, pp:339-353 [Conf ] Antoine Joux , Gwenaëlle Martinet , Frédéric Valette Blockwise-Adaptive Attackers: Revisiting the (In)Security of Some Provably Secure Encryption Models: CBC, GEM, IACBC. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2002, pp:17-30 [Conf ] Éliane Jaulmes , Antoine Joux , Frédéric Valette On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. [Citation Graph (0, 0)][DBLP ] FSE, 2002, pp:237-251 [Conf ] Frédéric Muller , Frédéric Valette High-Order Attacks Against the Exponent Splitting Protection. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:315-329 [Conf ] Pierre-Alain Fouque , Antoine Joux , Gwenaëlle Martinet , Frédéric Valette Authenticated On-Line Encryption. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2003, pp:145-159 [Conf ] On the Security of the CCM Encryption Mode and of a Slight Variant. [Citation Graph (, )][DBLP ] SCARE of an Unknown Hardware Feistel Implementation. [Citation Graph (, )][DBLP ] The Carry Leakage on the Randomized Exponent Countermeasure. [Citation Graph (, )][DBLP ] Practical Electromagnetic Template Attack on HMAC. [Citation Graph (, )][DBLP ] Defeating classical Hardware Countermeasures: a new processing for Side Channel Analysis. [Citation Graph (, )][DBLP ] Enhancing correlation electromagnetic attack using planar near-field cartography. [Citation Graph (, )][DBLP ] Fault Attack on Schnorr Based Identification and Signature Schemes. [Citation Graph (, )][DBLP ] Fault Attack onElliptic Curve Montgomery Ladder Implementation. [Citation Graph (, )][DBLP ] Detailed Analyses of Single Laser Shot Effects in the Configuration of a Virtex-II FPGA. [Citation Graph (, )][DBLP ] Robustness evaluation and improvements under laser-based fault attacks of an AES crypto-processor implemented on a SRAM-based FPGA. [Citation Graph (, )][DBLP ] Defeating Any Secret Cryptography with SCARE Attacks. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs